期刊文献+

大型企业集团“私有云”的制造服务系统研究

Research On Manufacturing Service Platform of "Private Cloud" for Large Enterprise Group
下载PDF
导出
摘要 针对当前中国制造业大而不精的现状,提出通过在大型企业集团内部建立"私有云"制造服务平台,以提高生产效率。通过对多种云制造模式进行比较分析,发现企业"私有云"的优势所在,得出其具有可行性的结论。分析企业生产链模式,提出建立技术参数数据库、实现云制造动态化以及交互式等具体应用。 In view of the current situation of China's manufacturing industry that is big and not fine.In order to improve the production efficiency, the establishment of a "private cloud" manufacturing service platform is proposed to improve the efficiency of production.Through a variety of cloud manufacturing model for comparative analysis,found that the enterprise "private cloud" advantage,come to the conclusion that it is feasible.According to analysis the enterprise production chain model and establish the database of technical parameters,to achieve dynamic and interactive cloud manufacturing and other specific applications.
出处 《装备制造技术》 2016年第6期130-132,共3页 Equipment Manufacturing Technology
关键词 大型企业 “私有云” 云端技术数据库 云端动态数据库 交互式平台 cloud manufacturing "private cloud" technical parameter database interactive processing large enterprises
  • 相关文献

参考文献7

二级参考文献39

  • 1程鹏,毕新华.跨组织流程柔性的运动轨迹研究[J].现代管理科学,2006(3):20-21. 被引量:8
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 4Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 5Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 6Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 7Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 8Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 9Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 10Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.

共引文献1468

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部